Implementation, enforcement and continuous updating and monitoring of security policy and procedures.

Regular back-ups and off-site storage of data.

WARNING!

Thanks to the efforts of a certain Mr Edward Snowden, we now know that the United States National Security Agency (NSA) with its snooping programs can access almost any data on the Internet and Internet connected devices, regardless of encryption technologies and other security measures employed.